Author of the publication

A flexible remote user authentication scheme using smart cards.

, , and . ACM SIGOPS Oper. Syst. Rev., 36 (3): 46-52 (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward A Secure Single Sign-On Mechanism for Distributed Computer Networks., and . Comput. J., 58 (4): 934-943 (2015)Toward a secure batch verification with group testing for VANET., and . Wireless Networks, 19 (6): 1441-1449 (2013)A new authentication protocol based on pointer forwarding for mobile communications., , and . Wirel. Commun. Mob. Comput., 8 (5): 661-672 (2008)ES-HAS: ECC-Based Secure Handover Authentication Scheme for Roaming Mobile User in Global Mobility Networks., , , and . Cryptogr., 5 (4): 35 (2021)Two Attacks on the Wu-Hsu User Identification Scheme.. Int. J. Netw. Secur., 1 (3): 147-148 (2005)A Secure and Efficient One-time Password Authentication Scheme for WSN., , , and . Int. J. Netw. Secur., 19 (2): 177-181 (2017)Image Enhancement and Features Extraction of Electron Microscopic Images Using Sigmoid Function and 2D-DCT., , , , and . IEEE Access, (2022)Strategies to Measure Soil Moisture Using Traditional Methods, Automated Sensors, Remote Sensing, and Machine Learning Techniques: Review, Bibliometric Analysis, Applications, Research Findings, and Future Directions., , , and . IEEE Access, (2023)A Blockchain Based Data Aggregation and Group Authentication Scheme for Electronic Medical System., , , , and . IEEE Access, (2020)A tabular steganography scheme for graphical password authentication., , , and . Comput. Sci. Inf. Syst., 7 (4): 823-841 (2010)